Management of Criminal Justice Information Systems

advertisement
Management of Criminal
Justice Information
Systems
Course Orientation and
Introduction
Copyright 2007-2008 Raymond E.
Foster
Today’s Schedule
 Instructor
Introduction
 University Education
 Course Outline and Expectations
 Website Orientation
 Course Beginning
Copyright 2007-2008 Raymond E.
Foster
Copyright 2007-2008 Raymond E.
Foster
Copyright 2007-2008 Raymond E.
Foster
Copyright 2007-2008 Raymond E.
Foster
Copyright 2007-2008 Raymond E.
Foster
Contact Me
 Office

Hours:
By Appointment
 Office
Telephone: 909.599.7530
 raymond@hitechcj.com
Copyright 2007-2008 Raymond E.
Foster
What does a university education
mean?
You can manage a long term project.
You can work independently.
You can work in a group.
You can manage competing resources.
You can read and write.
You learned new ideas.
You were exposed to a variety of cultures.
You enhanced
your critical thinking skills
Copyright 2007-2008 Raymond E.
Foster
Course Objectives:
This course concentrates on the introduction and use of
technology in the management of criminal justice data and
systems. The learner examines the issues and impacts on
criminology and the criminal justice system caused by the
availability and usage of technological advancements. It will
also survey the trends and uses of modern technology in
police response, criminal investigations, communications,
response to major incidents and the administration of
management and personnel data. It will examine
problematic issues, impact on current laws, jurisdiction, the
potential unintended consequences of technology in criminal
justice management.
Copyright 2007-2008 Raymond E.
Foster
How this Course Relates to Major
•
•
Summarize and interpret current issues in the field of
criminal justice and how these issues impact criminal
justice organizations, criminal justice personnel and
other stakeholders; and,
Analyze, critique and defend criminal justice policy
and service delivery from a management point of
view.
Copyright 2007-2008 Raymond E.
Foster
Course Specific Outcomes







Compare and contrast the difference between tactical, strategic and management
information in a criminal justice organization;
Summarize and assess the limitations, strengths and potentials of criminal justice
management technologies such as data bases, geographic information systems and
a myriad of communications schemes;
Develop information, technology, research and computer literacy skills through
practical exercises, and course required research and assignments;
Express, interpret and assess the ethical and social impact of technology and
information systems on criminal justice management, stakeholders and personnel
through written assignments, group presentations and individual presentations.
Describe and summarize how technology has changed crime and created new types
of crimes;
Describe and summarize the ethical considerations of information management such
as employee monitoring, search and seizure, and other contemporary issues; and,
Place the role of technology and information management in a broader context by
examining the historical, theoretical and practical developments of technology in
criminal justice.
Copyright 2007-2008 Raymond E.
Foster
Required Text:
 Foster,
Raymond E. “Police Technology”
Prentice Hall, July 2004
Copyright 2007-2008 Raymond E.
Foster
Required Supplemental Readings
 Your
Source for Law Enforcement IT
Guidance, The Police Chief, Technology
Talk, May 20
 Introduction to Wireless Data, Broadbeam
White Paper, 2003
 When They Can’t Talk, Lives Are Lost,
National Institute for Justice
Copyright 2007-2008 Raymond E.
Foster
Recommended Readings













800 MHz Public Safety Interference: The Consensus Plan
Your Source for Law Enforcement IT Guidance
Radio Spectrum
Intranets: A New Tool for Corrections Managers
Introduction to Wireless Data
Improving Public Safety through Justice Information Sharing
Public Safety and the Interoperability Challenge Public Safety and the
Interoperability
Crime Analysis in America: Findings and Recommendations
DNA Testing: Foolproof ? CBS News 60 Minutes
Forensic Odontology: A Global Activity
A Beginner's Primer on the Investigation of Forensic Evidence
Can Wiretaps Remain Cost Effective?
Big Brother in the Wires Wiretapping in the Digital Age?
Copyright 2007-2008 Raymond E.
Foster
Course Requirements:
This course is organized into four modules of
instruction. In this eight week session, each
module is two weeks in length. A course
calendar is attached as the last page of your
syllabus. Each module includes specific
activities and assignments.
Copyright 2007-2008 Raymond E.
Foster
Module One
Readings:
1. Chapters one through six of the primary text, Police Technology
2. Your Source for Law Enforcement IT Guidance, The Police Chief,
Talk, May 20
3. Introduction to Wireless Data, Broadbeam White Paper, 2003
1.
2.
3.
4.
5.
6.
7.
8.
9.
Course Orientation
Video – History of Police Technology
Online Forum Participation
Group Project Selection
Selection of individual Issue Papers (2)
Lecture
Individual Website Selection and Presentations
Practical exercise assignments
Exam One
Copyright 2007-2008 Raymond E.
Foster
Technology
Module Two
Readings:
1. Chapters seven through twelve of the primary text, Police Technology
2. When They Can’t Talk, Lives Are Lost, National Institute for Justice
Activities:
1. Online forum participation
2. Group Project work
3. Individual Issue Paper Research and Work
4. Issue Paper One Due
5. Lecture
6. Practical exercise roundtable discussion
Copyright 2007-2008 Raymond E.
Foster
Module Three
Readings:
1. Chapters thirteen through eighteen of primary text, Police Technology.
Activities:
1. Online forum participation
2. Group Project work
3. Individual Issue Paper Research and Work
4. Issue Paper Two Due
5. Lecture
6. Exam Two
Copyright 2007-2008 Raymond E.
Foster
Module Four
Readings:
1. Chapters 19-21, if they haven’t been read for group panel discussion exercise,
should be read for “audience participation.”
Activities:
1. Online forum participation
2. Group Project work
3. Group Project Panel discussions.
4. Individual Issue Paper
5. Lecture
Copyright 2007-2008 Raymond E.
Foster
Week
Date
Activity
Assignment Due
Readings
Module One
One
Per
Syllabus
Course Orientation,
Video, Website
Assignments, Group
Assignments, Lecture
None
Two
Per
Syllabus
Website
Presentations,
Lecture, Exam One
Forum participation,
Website
Presentations, Exam
One
CH1-6, Supplemental readings
Module Two
Three
Per
Syllabus
Tutorial
None
Four
Per
Syllabus
Practical Exercise
Roundtable, lecture
Exercise
Roundtable, Issue
Paper No. 1, forum
participation
CH7-12, Supplemental Reading
Module Three
Five
Per
Syllabus
Tutorial
None
Six
Per
Syllabus
Lecture, Exam Two
Exam Two, forum
participation
CH13-18
Module Four
Seven
Eight
Per
Syllabus
Per
Syllabus
Tutorial
None
Group Panel
Discussions, WrapLecture, course
evaluation.
Group paper, Issue
Paper No. 2, forum
participation
Copyright 2007-2008 Raymond E.
Foster
CH19-21
Method of Evaluation:
Exam One
Exam Two
Group Project
Issue Paper One
Issue Paper Two
Practical Exercise
Website Presentation
Participation
Semester Total
10%
20%
20%
10%
10%
10%
10%
10%
100%
Copyright 2007-2008 Raymond E.
Foster
A
90-100%
B
80-89%
C
70-79%
U
69% and
Under
Attendance
Within the university setting, learners are expected to attend class on a regular
basis, complete all readings and assignments before the stated dates and
participate in topic discussions to enhance their overall learning experience. As
participation is directly related to attendance, and because of the abbreviated
nature of the eight week session, learners missing any class will not receive credit
for participation. Attendance will be recorded by a class roster that will be passed
among the learners during each class. It is the learner’s responsibility to sign the
roster.
Copyright 2007-2008 Raymond E.
Foster
Ethical Conduct
Learners should be aware that there are severe
consequences for violations of academic ethical
conduct. Primarily, we are concerned with
cheating and plagiarism. Learners who are
determined to have cheated or committed
plagiarism will face disciplinary action as identified
within UI&U regulations. For additional
clarification of cheating and/or plagiarism, refer to
the UI&U Catalog for policies regarding Academic
Integrity.
Copyright 2007-2008 Raymond E.
Foster
Schedule Changes
 The
syllabus and schedule are subject to
change in the event of extenuating
circumstances and/or upon due notice and
at the discretion of the instructor.
Copyright 2007-2008 Raymond E.
Foster
Exam One and Two
Exams one and two will consist of 50
multiple choice, true-false or fill-in the blank
questions. All of the material in the exams
will come from the primary text and will be
cumulative. The exams are take-home, will
be given out at course orientation and must
be returned on the due date
Copyright 2007-2008 Raymond E.
Foster
Issue Papers
Learners are required to prepare two (2) typed, 3-5
page, papers that are a discussion and analysis of
a course related issue. At a minimum, it is
expected that the learners will produce an
academically sound and properly formatted work
(APA format is strongly encouraged); with a
minimum of three sources, not including the text
book. Based on the readings, the learners are required to
identify two issues they would like to further explore, the
topics must be discussed with the instructor. The papers
will be graded on content as well as exposition.
Copyright 2007-2008 Raymond E.
Foster
Group Project
The final three chapters of the primary text book will be used as broad outline
for the group project. The group project has two components. First, each group
will produce an eight to ten page analysis of the assigned topic. Second, the
group will lead a panel discussion on their topic. The three board areas of inquiry
are: Personnel and Training; Implementing and Managing Technology; and,
Emerging and Future Technologies. At a minimum, the group paper should be
8-10 pages in length. In addition to being in APA format, the group paper
should address the following under these specific headings; Background; Impact
of Technology; Non-technology Alternatives; Stakeholders; Outcomes and
Consequences (intended and un-intended); Recommendations. The group as a
panel will then present their research and findings to the class. Groups should be
prepared to lead a 30 minute discussion.
Copyright 2007-2008 Raymond E.
Foster
Individual Website Presentations
Each learner will be assigned to conduct a
review of one specific websites. They will
then provide a ten minute presentation on
the website, as well as a one-page briefing
paper. The learner shall provide a copy of
the briefing paper to each member of the
class. The Websites are hyperlinked off
the course website
Copyright 2007-2008 Raymond E.
Foster
Participation
Participation is ten percent of the learner’s
final grade. In addition to attendance,
participation will also be measured by the
use of an online threaded discussion.
Specific instructions regarding the online
forum will be presented during the course
orientation and are available on the course
website.
Copyright 2007-2008 Raymond E.
Foster
Practical Exercise Roundtable
Discussion
Depending on the size of the class, each learner will be assigned
between one and three short, practical exercises. These exercises are
to be completed outside of classroom time. As an example, the learner
could: experiment with intrusion detection; experiment with state place
coordinates; or, determine an IP address. The exact practical exercise
will be assigned during class. The learner is to prepare a one
paragraph description of the experience and then participate in a
roundtable discussion with all class learners. At a minimum, the
roundtable discussion will explore: the value of practical exercises; the
potential for use in criminal justice; the potential for abuse in criminal
justice; and, the limitations of the technology.
Copyright 2007-2008 Raymond E.
Foster
Extra Credit
 There
is no extra credit available in this
course.
Copyright 2007-2008 Raymond E.
Foster
Students with Disabilities
Please refer to the Catalog for policies regarding American
Disabilities’ Act or
http://www.tui.edu/ASN/serv_learner_disab/default.asp for
further assistance regarding UI&U compliance with ADA.
Copyright 2007-2008 Raymond E.
Foster
General Stuff
 You
must read the text and the
supplemental material before the lecture.
 Reading will enhance your ability to
participate
 Participation will increase your grade,
enhance not only your learning, but your
enjoyment of the class.
Copyright 2007-2008 Raymond E.
Foster
Website
The course has one companion website. At
that website the students will find hyperlinks
to the readings, important course downloads
(such as the syllabus) and hyperlinks to
other course related multimedia
presentations (such as PowerPoint
presentations, short videos, etc).
Copyright 2007-2008 Raymond E.
Foster
Website
www.police-technology.net
Copyright 2007-2008 Raymond E.
Foster
Scroll Down
Copyright 2007-2008 Raymond E.
Foster
Copyright 2007-2008 Raymond E.
Foster
Copyright 2007-2008 Raymond E.
Foster
Copyright 2007-2008 Raymond E.
Foster
Copyright 2007-2008 Raymond E.
Foster
Copyright 2007-2008 Raymond E.
Foster
Copyright 2007-2008 Raymond E.
Foster
Copyright 2007-2008 Raymond E.
Foster
Copyright 2007-2008 Raymond E.
Foster
Copyright 2007-2008 Raymond E.
Foster
Copyright 2007-2008 Raymond E.
Foster
Copyright 2007-2008 Raymond E.
Foster
Scroll Down
Copyright 2007-2008 Raymond E.
Foster
Copyright 2007-2008 Raymond E.
Foster
Copyright 2007-2008 Raymond E.
Foster
Copyright 2007-2008 Raymond E.
Foster
Copyright 2007-2008 Raymond E.
Foster
Your Username
 First
Initial, Last Name, (location),
(Course)
 rfosterbrea410
 rfosterarcadia304
 rfostertwintowers410
Copyright 2007-2008 Raymond E.
Foster
Copyright 2007-2008 Raymond E.
Foster
Copyright 2007-2008 Raymond E.
Foster
Who Are you?
 Name
 Agency
 Technology
experience
 Reason for returning to university
 I have always been ………………
 I have always wanted to …………
Copyright 2007-2008 Raymond E.
Foster
Download